Sciweavers

IAT
2006
IEEE
14 years 2 months ago
Crime Pattern Detection Using Data Mining
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Shyam Varan Nath
IAT
2006
IEEE
14 years 2 months ago
A Human-Friendly MAS for Mining Stock Data
Mining stock data can be beneficial to the participants and researchers in the stock market. However, it is very difficult for a normal trader or researcher to apply data mining...
Jiarui Ni, Chengqi Zhang
HPDC
2006
IEEE
14 years 2 months ago
Troubleshooting Distributed Systems via Data Mining
Through massive parallelism, distributed systems enable the multiplication of productivity. Unfortunately, increasing the scale of available machines to users will also multiply d...
David A. Cieslak, Douglas Thain, Nitesh V. Chawla
CBMS
2006
IEEE
14 years 2 months ago
Incoporating Data Mining Applications into Clinical Guildelines
Computer based clinical guidelines have been developed to help caregivers in practicing medicine. GLIF3 (Guideline Interchange Format 3) is one of several standards that specify t...
Reza Sherafat Kazemzadeh, Kamran Sartipi
CBMS
2006
IEEE
14 years 2 months ago
An Infrastructure of Stream Data Mining, Fusion and Management for Monitored Patients
This paper proposes an infrastructure for data mining, fusion and patient care management using continuous stream data monitored from critically ill patients. Stream data mining, ...
Hyoil Han, Han C. Ryoo, Herbert Patrick
BIBE
2006
IEEE
138views Bioinformatics» more  BIBE 2006»
14 years 2 months ago
Assigning Schema Labels Using Ontology And Hueristics
Bioinformatics data is growing at a phenomenal rate. Besides the exponential growth of individual databases, the number of data depositories is increasing too. Because of the comp...
Xuan Zhang, Ruoming Jin, Gagan Agrawal
AINA
2006
IEEE
14 years 2 months ago
Peer-to-Peer Usage Analysis: a Distributed Mining Approach
With the huge number of information sources available on the Internet, Peer-to-Peer (P2P) systems offer a novel kind of system architecture providing the large-scale community wit...
Florent Masseglia, Pascal Poncelet, Maguelonne Tei...
SGAI
2007
Springer
14 years 2 months ago
Frequent Set Meta Mining: Towards Multi-Agent Data Mining
In this paper we describe the concept of Meta ARM in the context of its objectives and challenges and go on to describe and analyse a number of potential solutions. Meta ARM is de...
Kamal Ali Albashiri, Frans Coenen, Robert Sanderso...
PREMI
2007
Springer
14 years 2 months ago
Discovery of Process Models from Data and Domain Knowledge: A Rough-Granular Approach
The rapid expansion of the Internet has resulted not only in the ever-growing amount of data stored therein, but also in the burgeoning complexity of the concepts and phenomena per...
Andrzej Skowron
PAKDD
2007
ACM
121views Data Mining» more  PAKDD 2007»
14 years 2 months ago
Two-Phase Algorithms for a Novel Utility-Frequent Mining Model
When companies seek for the combination of products which can constantly generate high profit, the association rule mining (ARM) or the utility mining will not achieve such task. ...
Jieh-Shan Yeh, Yu-Chiang Li, Chin-Chen Chang